Lookup for vulnerabilities affecting packages.

GET /api/vulnerabilities/30535?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/vulnerabilities/30535?format=api",
    "vulnerability_id": "VCID-g1xe-smzd-pyfb",
    "summary": "Unpatched extfs vulnerabilities are exploitable through suid-mode Apptainer\n### Impact\nThere is an ext4 use-after-free flaw described in CVE-2022-1184 that is exploitable through versions of Apptainer < 1.1.0 and installations that include apptainer-suid < 1.1.8 on older operating systems where that CVE has not been patched.  That includes Red Hat Enterprise Linux 7, Debian 10 buster (unless the linux-5.10 package is installed), Ubuntu 18.04 bionic and Ubuntu 20.04 focal.  Use-after-free flaws in the kernel can be used to attack the kernel for denial of service and potentially for privilege escalation.\n\n### Background\nHistorically there have been many CVEs published for extfs and a smaller number for squashfs, including serious use-after-free and buffer overrun vulnerabilities, that are scored as \"Moderate\" or \"Low\" impact only because unprivileged users were assumed to not have write access to the raw data.  Because of those ratings, vendors treat such CVEs as low urgency and either delay a patch until their next major release or never patch older but still supported operating systems at all.  Many Linux distributions automatically mount user-writable USB-drive volumes, but those are considered low risk because they require physical access to the machine.  However, since setuid-root installations of Apptainer by default allow all users to mount any extfs (specifically, ext3, which is implemented by the ext4 driver) and squashfs filesystem using kernel drivers even though the users have write access to the raw data, the setuid-root installations raise the severity of such unpatched CVEs.  \n\nCVE-2022-1184 is currently such an unpatched CVE, at least on the above listed operating systems.  The descriptions from the operating system vendors about the CVE (referenced below) are incomplete, saying only that it allows a local attacker with user privilege to cause a denial of service.  Normally users would not be able to cause it because they cannot modify the filesystem image, and normally vulnerabilities that involve kernel memory corruption by unprivileged users are considered high severity even when there is not yet a known privilege escalation because someone with sufficient kernel knowledge can usually turn such a corruption into a privilege escalation. \n\nRed Hat did not list RHEL7 as vulnerable, but they also did not list it as unaffected, and testing confirmed that a filesystem image could be corrupted to get past the check inserted into the filesystem driver to fix the vulnerability (patches linked below).\n\nAll published squashfs CVEs have been patched in currently supported major operating systems.\n\n### Patches\nApptainer 1.1.8 includes a patch that by default disables mounting of extfs filesystem types in setuid-root mode, while continuing to allow mounting of extfs filesystems in non-setuid \"rootless\" mode using fuse2fs.\n\n### Workarounds\nThese workarounds are possible:\n1. Either do not install apptainer-suid (for versions 1.1.0 through 1.1.7) or set `allow setuid = no` in apptainer.conf.  This requires having unprivileged user namespaces enabled and except for apptainer 1.1.x versions will disallow mounting of sif files, extfs files, and squashfs files in addition to other, less significant impacts.  (Encrypted sif files are also not supported unprivileged in apptainer 1.1.x.)\n2. Alternatively, use the `limit containers` options in apptainer.conf/singularity.conf to limit sif files to trusted users, groups, and/or paths.  (The option `allow container extfs = no` disallows mounting extfs overlay files but does not disallow mounting of extfs overlay partitions inside SIF files, so it does not help work around the problem.)\n\n### References\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-1184\nhttps://access.redhat.com/security/cve/cve-2022-1184\nhttps://security-tracker.debian.org/tracker/CVE-2022-1184\nhttps://ubuntu.com/security/CVE-2022-1184\nKernel patches for CVE-2022-1184:\nhttps://github.com/torvalds/linux/commit/65f8ea4cd57dbd46ea13b41dc8bac03176b04233\nhttps://github.com/torvalds/linux/commit/61a1d87a324ad5e3ed27c6699dfc93218fcf3201\n\n------\n\n## Addendum 30 May 2023\n\nNew information has become available: many ext4 filesytem vulnerabilities similar to the one in CVE-2022-1184 continue to be found, and most of them do not ever have a CVE assigned.  The way to locate them is to search for \"syzbot\" in linux kernel commit messages under fs/ext4.  \"syzbot\" is a public automated system for finding kernel bugs.  Especially when syzbot reports are labeled \"KASAN\" (Kernel Address Sanitizer) and especially if they involve memory corruption including \"use after free\", \"out of bounds\", or \"user-memory-access\", they are vulnerabilities that can potentially be turned into privilege escalation when an unprivileged user has write access to the underlying data.\n\nIn particular there are two such commits from this month, May 2023, referenced below.  They both have commit messages describing a situation of write access to the underlying data while the kernel has that data mounted as a filesystem.  These commits have been backported to currently maintained kernel lines in versions 4.19.293 and 5.4.243, but since they are considered moderate severity, most common OS distributions do not include them immediately.  For example since RHEL9.2 was recently announced, they are not likely to be available in RHEL9 until 9.3 is released in about another 6 months.  Therefore if system administrators want to be protected against these vulnerabilities while still allowing ext4 filesystem mounts through setuid-root apptainer, they should watch for these types of commits and whenever such commits are released the administrators should update to the latest currently maintained kernel version (bypassing their OS vendor's distribution) and reboot.\n\nhttps://github.com/torvalds/linux/commit/2220eaf90992c11d888fe771055d4de3303\nhttps://github.com/torvalds/linux/commit/4f04351888a83e595571de672e0a4a8b74f\nhttps://lwn.net/Articles/932137/\nhttps://lwn.net/Articles/932136/",
    "aliases": [
        {
            "alias": "CVE-2023-30549"
        },
        {
            "alias": "GHSA-j4rf-7357-f4cg"
        }
    ],
    "fixed_packages": [
        {
            "url": "http://public2.vulnerablecode.io/api/packages/459110?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=armv7&distroversion=v3.22&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=armv7&distroversion=v3.22&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/459111?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=loongarch64&distroversion=v3.22&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=loongarch64&distroversion=v3.22&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/459112?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=ppc64le&distroversion=v3.22&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=ppc64le&distroversion=v3.22&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/459115?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=x86&distroversion=v3.22&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=x86&distroversion=v3.22&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/492254?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=armhf&distroversion=edge&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=armhf&distroversion=edge&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/492255?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=armv7&distroversion=edge&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=armv7&distroversion=edge&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/492256?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=loongarch64&distroversion=edge&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=loongarch64&distroversion=edge&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/492259?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=s390x&distroversion=edge&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=s390x&distroversion=edge&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/492260?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=x86&distroversion=edge&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=x86&distroversion=edge&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/525971?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=loongarch64&distroversion=v3.21&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=loongarch64&distroversion=v3.21&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/525972?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=ppc64le&distroversion=v3.21&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=ppc64le&distroversion=v3.21&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/525973?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=riscv64&distroversion=v3.21&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=riscv64&distroversion=v3.21&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/525974?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=s390x&distroversion=v3.21&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=s390x&distroversion=v3.21&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/567740?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=aarch64&distroversion=v3.23&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=aarch64&distroversion=v3.23&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/567746?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=s390x&distroversion=v3.23&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=s390x&distroversion=v3.23&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/567747?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=x86&distroversion=v3.23&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=x86&distroversion=v3.23&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1015309?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=aarch64&distroversion=v3.19&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=aarch64&distroversion=v3.19&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1015312?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=ppc64le&distroversion=v3.19&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=ppc64le&distroversion=v3.19&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1015315?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=x86_64&distroversion=v3.19&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=x86_64&distroversion=v3.19&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1045747?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=ppc64le&distroversion=v3.20&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=ppc64le&distroversion=v3.20&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1045749?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=s390x&distroversion=v3.20&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=s390x&distroversion=v3.20&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/459113?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=riscv64&distroversion=v3.22&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=riscv64&distroversion=v3.22&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/459114?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=s390x&distroversion=v3.22&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=s390x&distroversion=v3.22&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/492253?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=aarch64&distroversion=edge&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=aarch64&distroversion=edge&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/567741?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=armhf&distroversion=v3.23&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=armhf&distroversion=v3.23&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/567744?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=ppc64le&distroversion=v3.23&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=ppc64le&distroversion=v3.23&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1015311?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=armv7&distroversion=v3.19&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=armv7&distroversion=v3.19&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/567748?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=x86_64&distroversion=v3.23&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=x86_64&distroversion=v3.23&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1015313?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=s390x&distroversion=v3.19&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=s390x&distroversion=v3.19&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1045744?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=aarch64&distroversion=v3.20&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=aarch64&distroversion=v3.20&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1045745?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=armhf&distroversion=v3.20&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=armhf&distroversion=v3.20&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/525969?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=armhf&distroversion=v3.21&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=armhf&distroversion=v3.21&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/525970?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=armv7&distroversion=v3.21&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=armv7&distroversion=v3.21&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/525975?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=x86&distroversion=v3.21&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=x86&distroversion=v3.21&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/459108?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=aarch64&distroversion=v3.22&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=aarch64&distroversion=v3.22&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/492257?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=ppc64le&distroversion=edge&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=ppc64le&distroversion=edge&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/492258?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=riscv64&distroversion=edge&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=riscv64&distroversion=edge&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/492261?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=x86_64&distroversion=edge&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=x86_64&distroversion=edge&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/525968?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=aarch64&distroversion=v3.21&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=aarch64&distroversion=v3.21&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/525976?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=x86_64&distroversion=v3.21&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=x86_64&distroversion=v3.21&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/567742?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=armv7&distroversion=v3.23&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=armv7&distroversion=v3.23&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/567743?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=loongarch64&distroversion=v3.23&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=loongarch64&distroversion=v3.23&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/567745?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=riscv64&distroversion=v3.23&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=riscv64&distroversion=v3.23&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1015310?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=armhf&distroversion=v3.19&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=armhf&distroversion=v3.19&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1015314?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=x86&distroversion=v3.19&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=x86&distroversion=v3.19&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1045746?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=armv7&distroversion=v3.20&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=armv7&distroversion=v3.20&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/459109?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=armhf&distroversion=v3.22&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=armhf&distroversion=v3.22&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/459116?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=x86_64&distroversion=v3.22&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=x86_64&distroversion=v3.22&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1045748?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=riscv64&distroversion=v3.20&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=riscv64&distroversion=v3.20&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1045751?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=x86_64&distroversion=v3.20&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=x86_64&distroversion=v3.20&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1045750?format=api",
            "purl": "pkg:apk/alpine/apptainer@1.1.8-r0?arch=x86&distroversion=v3.20&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.8-r0%3Farch=x86&distroversion=v3.20&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/939444?format=api",
            "purl": "pkg:deb/debian/singularity-container@3.11.4%2Bds1-1?distro=sid",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/singularity-container@3.11.4%252Bds1-1%3Fdistro=sid"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/939435?format=api",
            "purl": "pkg:deb/debian/singularity-container@4.1.5%2Bds4-1?distro=sid",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/singularity-container@4.1.5%252Bds4-1%3Fdistro=sid"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/71970?format=api",
            "purl": "pkg:ebuild/app-containers/apptainer@1.1.8",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-containers/apptainer@1.1.8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/71344?format=api",
            "purl": "pkg:golang/github.com/apptainer/apptainer@1.1.8",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:golang/github.com/apptainer/apptainer@1.1.8"
        }
    ],
    "affected_packages": [],
    "references": [
        {
            "reference_url": "https://access.redhat.com/security/cve/cve-2022-1184",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.0",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "value": "7.1",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T18:37:22Z/"
                }
            ],
            "url": "https://access.redhat.com/security/cve/cve-2022-1184"
        },
        {
            "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-30549",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "0.00026",
                    "scoring_system": "epss",
                    "scoring_elements": "0.07308",
                    "published_at": "2026-04-21T12:55:00Z"
                },
                {
                    "value": "0.00026",
                    "scoring_system": "epss",
                    "scoring_elements": "0.07181",
                    "published_at": "2026-04-18T12:55:00Z"
                },
                {
                    "value": "0.00026",
                    "scoring_system": "epss",
                    "scoring_elements": "0.07186",
                    "published_at": "2026-04-16T12:55:00Z"
                },
                {
                    "value": "0.00026",
                    "scoring_system": "epss",
                    "scoring_elements": "0.07257",
                    "published_at": "2026-05-05T12:55:00Z"
                },
                {
                    "value": "0.00026",
                    "scoring_system": "epss",
                    "scoring_elements": "0.07268",
                    "published_at": "2026-04-12T12:55:00Z"
                },
                {
                    "value": "0.00026",
                    "scoring_system": "epss",
                    "scoring_elements": "0.07179",
                    "published_at": "2026-04-02T12:55:00Z"
                },
                {
                    "value": "0.00026",
                    "scoring_system": "epss",
                    "scoring_elements": "0.07286",
                    "published_at": "2026-04-09T12:55:00Z"
                },
                {
                    "value": "0.00026",
                    "scoring_system": "epss",
                    "scoring_elements": "0.07258",
                    "published_at": "2026-04-08T12:55:00Z"
                },
                {
                    "value": "0.00026",
                    "scoring_system": "epss",
                    "scoring_elements": "0.07203",
                    "published_at": "2026-04-07T12:55:00Z"
                },
                {
                    "value": "0.00026",
                    "scoring_system": "epss",
                    "scoring_elements": "0.07223",
                    "published_at": "2026-04-04T12:55:00Z"
                },
                {
                    "value": "0.00026",
                    "scoring_system": "epss",
                    "scoring_elements": "0.07281",
                    "published_at": "2026-04-11T12:55:00Z"
                },
                {
                    "value": "0.00026",
                    "scoring_system": "epss",
                    "scoring_elements": "0.07246",
                    "published_at": "2026-04-29T12:55:00Z"
                },
                {
                    "value": "0.00026",
                    "scoring_system": "epss",
                    "scoring_elements": "0.07274",
                    "published_at": "2026-04-26T12:55:00Z"
                },
                {
                    "value": "0.00026",
                    "scoring_system": "epss",
                    "scoring_elements": "0.07267",
                    "published_at": "2026-04-24T12:55:00Z"
                }
            ],
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-30549"
        },
        {
            "reference_url": "https://github.com/apptainer/apptainer",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.0",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://github.com/apptainer/apptainer"
        },
        {
            "reference_url": "https://github.com/apptainer/apptainer/commit/5a4964f5ba9c8d89a0e353b97f51fd607670a9f7",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.0",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "value": "7.1",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T18:37:22Z/"
                }
            ],
            "url": "https://github.com/apptainer/apptainer/commit/5a4964f5ba9c8d89a0e353b97f51fd607670a9f7"
        },
        {
            "reference_url": "https://github.com/apptainer/apptainer/releases/tag/v1.1.8",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.0",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "value": "7.1",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T18:37:22Z/"
                }
            ],
            "url": "https://github.com/apptainer/apptainer/releases/tag/v1.1.8"
        },
        {
            "reference_url": "https://github.com/apptainer/apptainer/security/advisories/GHSA-j4rf-7357-f4cg",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.0",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "value": "7.1",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T18:37:22Z/"
                }
            ],
            "url": "https://github.com/apptainer/apptainer/security/advisories/GHSA-j4rf-7357-f4cg"
        },
        {
            "reference_url": "https://github.com/torvalds/linux/commit/2220eaf90992c11d888fe771055d4de3303",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.0",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "value": "7.1",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T18:37:22Z/"
                }
            ],
            "url": "https://github.com/torvalds/linux/commit/2220eaf90992c11d888fe771055d4de3303"
        },
        {
            "reference_url": "https://github.com/torvalds/linux/commit/4f04351888a83e595571de672e0a4a8b74f",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.0",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "value": "7.1",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T18:37:22Z/"
                }
            ],
            "url": "https://github.com/torvalds/linux/commit/4f04351888a83e595571de672e0a4a8b74f"
        },
        {
            "reference_url": "https://github.com/torvalds/linux/commit/61a1d87a324ad5e3ed27c6699dfc93218fcf3201",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.0",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://github.com/torvalds/linux/commit/61a1d87a324ad5e3ed27c6699dfc93218fcf3201"
        },
        {
            "reference_url": "https://github.com/torvalds/linux/commit/65f8ea4cd57dbd46ea13b41dc8bac03176b04233",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.0",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://github.com/torvalds/linux/commit/65f8ea4cd57dbd46ea13b41dc8bac03176b04233"
        },
        {
            "reference_url": "https://lwn.net/Articles/932136",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.0",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://lwn.net/Articles/932136"
        },
        {
            "reference_url": "https://lwn.net/Articles/932137",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.0",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://lwn.net/Articles/932137"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1184",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.0",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1184"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-30549",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.0",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-30549"
        },
        {
            "reference_url": "https://security.gentoo.org/glsa/202311-13",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.0",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "value": "7.1",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T18:37:22Z/"
                }
            ],
            "url": "https://security.gentoo.org/glsa/202311-13"
        },
        {
            "reference_url": "https://security-tracker.debian.org/tracker/CVE-2022-1184",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.0",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "value": "7.1",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T18:37:22Z/"
                }
            ],
            "url": "https://security-tracker.debian.org/tracker/CVE-2022-1184"
        },
        {
            "reference_url": "https://sylabs.io/2023/04/response-to-cve-2023-30549",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.0",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://sylabs.io/2023/04/response-to-cve-2023-30549"
        },
        {
            "reference_url": "https://ubuntu.com/security/CVE-2022-1184",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.0",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "value": "7.1",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T18:37:22Z/"
                }
            ],
            "url": "https://ubuntu.com/security/CVE-2022-1184"
        },
        {
            "reference_url": "https://www.suse.com/security/cve/CVE-2022-1184.html",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.0",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "value": "7.1",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T18:37:22Z/"
                }
            ],
            "url": "https://www.suse.com/security/cve/CVE-2022-1184.html"
        },
        {
            "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035026",
            "reference_id": "1035026",
            "reference_type": "",
            "scores": [],
            "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035026"
        },
        {
            "reference_url": "https://lwn.net/Articles/932136/",
            "reference_id": "932136",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.1",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T18:37:22Z/"
                }
            ],
            "url": "https://lwn.net/Articles/932136/"
        },
        {
            "reference_url": "https://lwn.net/Articles/932137/",
            "reference_id": "932137",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.1",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T18:37:22Z/"
                }
            ],
            "url": "https://lwn.net/Articles/932137/"
        },
        {
            "reference_url": "https://sylabs.io/2023/04/response-to-cve-2023-30549/",
            "reference_id": "response-to-cve-2023-30549",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.1",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T18:37:22Z/"
                }
            ],
            "url": "https://sylabs.io/2023/04/response-to-cve-2023-30549/"
        }
    ],
    "weaknesses": [
        {
            "cwe_id": 416,
            "name": "Use After Free",
            "description": "Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code."
        }
    ],
    "exploits": [],
    "severity_range_score": "7.0 - 8.9",
    "exploitability": null,
    "weighted_severity": null,
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g1xe-smzd-pyfb"
}